ECE 4400:427/527 - Computer Networks Spring 2017

Slides:



Advertisements
Similar presentations
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Advertisements

1 Packet Switching, Layer Models and Protocol Suites Data Communications and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Dr. Philip Cannata 1 Computer Networking. Dr. Philip Cannata 2.
KOM 15032: Arsitektur Jaringan Terkini
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security Lecture.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 2 Introduction to Networks and the Internet.
Networking Based on the powerpoint presentation of Computer Networking: A Top Down Approach Featuring the Internet, Third Edition, J.F. Kurose and K.W.
Protocols and the TCP/IP Suite
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Introduction Protocol “layers” Networks are complex, with many “pieces”:  hosts  routers  links of various media  applications  protocols  hardware,
1 Week 2 Lecture 1 Layers (basics) Dr. Fei Hu. Review last lecture 2.
Review: – computer networks – topology: pair-wise connection, point-to-point networks and broadcast networks – switching techniques packet switching and.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
CS 381 Introduction to computer networks Chapter 1 - Lecture 4 2/10/2015.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
ECE 4400:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi.
Introduction 1-1 “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from.
Spring 2006Computer Networks1 Chapter 2 Network Models.
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
TCP/IP Network.
OSI Model Data Communications. 7 layer “research” model ApplicationPresentationSessionTransportNetworkLinkPhysical.
1 Computer Networks & The Internet Lecture 4 Imran Ahmed University of Management & Technology.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Reference model. Goal: 2 message exchange between application processes.
CS 3830 Day 4 Introduction 1-1. Announcements  No office hour 12pm-1pm today only  Quiz on Friday  Program 1 due on Friday (put in DropBox on S drive)
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Net 221D:Computer Networks Fundamentals
Introduction and Overview of Network and Telecommunications.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
NWEN 243 Networked Applications Lecture 12: Layer 4 – Transport NWEN 243 © , Kris Bubendorfer.
Introduction and Overview of Network and Telecommunications (contd.)
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Computer Networks Dr. Adil Yousif CS Lecture 1.
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420.
Overview: Cloud Datacenters II
Introduction and Overview of Network and Telecommunications
Introduction to Computer Networks
Introduction to Networks
Computer Networks.
Network Introduction.
Network Architecture Layered system with alternative abstractions available at a given layer.
OSI Protocol Stack Given the post man exemple.
Introduction and Overview of Network and Telecommunications (contd.)
Understand the OSI Model Part 2
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 423.
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
CSE 4905 Network Security Overview
Lectures Computer networking تمرین 3 نمره. پژوهش عملیاتی 2 نمره.
Protocols and the TCP/IP Suite
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
Network Architecture and the OSI Reference Model
TCP/IP Protocol Suite: Review
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Chapter 2 Network Models
Network Architecture Models
Protocols and the TCP/IP Suite
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Department of Computer Science Southern Illinois University Carbondale CS441 – Mobile & Wireless Computing Overview of Computer Networking Protocols.
Presentation transcript:

ECE 4400:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Some Discussions We know that there are substantial requirements for NETWORK DESIGN General, cost-effective, fair, robust connectivity among large computers/users Should be manageable by humans of varying levels of skills Network designers have developed general blueprints referred to as NETWORK ARCHITECTURES to deal with complexity Guide the design and implementation of networks Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Outline In this lecture, we introduce some central ideas common to all network architecture Layering Protocols We also consider two most widely referenced architectures: The OSI -7 –layer Internet architecture Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Layering Communication network is so complex Contain many pieces: hosts, switching devices, channels, etc How we can manage complexity? Using divide and conquer approach: Idea of Layering Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Example of Air Travel Travelling contain a series of steps Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

intermediate air-traffic Layering of Air Travel ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival intermediate air-traffic control centers ticket (complain) baggage (claim gates (unload) runway (land) ticket baggage gate takeoff/landing Layers: each layer implements a service via its own internal-layer actions relying on services provided by layer below Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Why Layering? Dealing with complex systems: Explicit structure allows identification, relationship of complex system’s pieces Layered reference model for discussion Modularization eases maintenance, updating of system change of implementation of layer’s service transparent to rest of system e.g., change in gate procedure doesn’t affect rest of system Layering considered harmful? Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Layering Abstraction Layer: A set of functionalities encapsulated in an object that can be used by other network components Why layering? Think complexity and common services Layers consist of protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Protocols Protocol defines the interfaces between the layers in the same system and with the layers of peer system Building blocks of a network architecture Each protocol object has two different interfaces service interface: operations on this protocol peer-to-peer interface: messages exchanged with peer Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Protocols Protocols in each layer have Service interface with upper layer/lower layers Peer-to-peer interface with host on same layer Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Hierarchical Layer Structure Layering implies the use of a layer hierarchy Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

OSI – Open Systems Interconnection OSI 7-Layer Model First formal way defined to connect computers One or more protocols implement the functionality assigned to a given layer Acts like a reference model rather than a real-world protocol graph First three layers are implemented in all network nodes The OSI 7-layer Model OSI – Open Systems Interconnection Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Description of Layer Physical Layer Data Link Layer Network Layer Handles the transmission of raw bits over a communication link Data Link Layer Collects a stream of bits into a larger aggregate called a frame Network adaptor along with device driver in OS implement the protocol in this layer Frames are actually delivered to hosts Network Layer Handles routing among nodes within a packet-switched network Unit of data exchanged between nodes in this layer is called a packet The lower three layers are implemented on all network nodes Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Description of Layer Transport Layer Session Layer Presentation Layer Implements a process-to-process channel Unit of data exchanges in this layer is called a message Session Layer Provides a name space that is used to tie together the potentially different transport streams that are part of a single application, e.g., synchronization Presentation Layer Concerned about the format of data exchanged between peers, e.g., encryption, compression Application Layer Standardize common type of exchanges The transport layer and the higher layers typically run only on end-hosts and not on the intermediate switches and routers Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

The Internet Architecture Application: supporting network applications FTP, SMTP, HTTP Transport: process data transfer TCP, UDP Network: routing of datagrams from source to destination IP, routing protocols Link: data transfer between neighboring network elements Ethernet, 802.111 (WiFi), PPP Physical: bits “on the wire” Application Transport Network Link Physical Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Internet Architecture vs OSI Presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine-specific conventions Session: synchronization, checkpointing, recovery of data exchange Internet stack “missing” these layers! These services, if needed, must be implemented in application Application Presentation Session Transport Network Link Physical Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

The Internet: Protocol Encapsulation source message M application transport network link physical segment Ht M Ht datagram Ht Hn M Hn frame Ht Hn Hl M link physical Ht Hn Hl M Ht Hn Hl M switch destination network link physical Ht Hn M Ht Hn M M application transport network link physical Ht Hn Hl M Ht Hn Hl M Ht M Ht Hn M router Ht Hn Hl M Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

Protocol Encapsulation: Example A in Office 1 sends to B in Office 2 a memo Memo: Application-layer message Memo needs to placed on an interoffice envelope and A needs to write an address: Envelope: Transport-layer segment, with header is A’s address Envelope headed to sending office mailroom and placed in a postal envelope; suited for public postal service: Datagram Sending to receiving office mailroom: De-encapsulation begins. B will finally get the memo. Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

The Internet: Alternative View FTP HTTP TFTP DNS TCP UDP IP Net 1 Net 1 Ethernet FDDI FTP: File Transfer Protocol HTTP: Hypertext Transport Protocol TFTP: Trivial File Transfer Protocol FDDI: Fiber Distributed Data Interface TCP: Transmission Control Protocol UDP: User Datagram Protocol IP: Internet Protocol Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

The Internet: Alternative View Subnetwork: Involve sublayers Internet Protocol: Support the interconnection of multiple networking technologies into a single, logical internetwork TCP/UDP: Two main protocols of third layer TCP: provide a reliable byte-stream channel UDP: provide an unreliable datagram delivery channel Sometimes called end-to-end protocols Application We will step by step go through those layers/protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

TCP vs. UDP TCP: most commonly used protocol on the Internet UDP: Source: Skullbox.net TCP: most commonly used protocol on the Internet UDP: Important data? For streaming audio and video; UDP packets in Denial of Service (DoS); also implemented in trojan horse viruses etc. Again, we will step by step go through all these Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527